CVE-2026-42476 POC (Proof-of-Concept)

CVE-2026-42476 POC (Proof-of-Concept)

Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.

Published: 2026-05-01

CVSS: 7.1

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H

Download CVE-2026-42476 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-100-cve-2026-43037/

https://hokyo.gr/poc-421-cve-2026-40329/

https://hokyo.gr/poc-358-cve-2026-43566/

Copyright 2017- 2025 Hokyo JapanEats ©